Showing 841 - 860 results of 2,739 for search 'Formula Renault~', query time: 2.78s Refine Results
  1. 841

    Design and Analysis of Power-function-sine Flexure Hinges by Li Jiabiao, Zhao Yang, Wu Qingwen, Mu Deqiang, Liu Changru, Hu Jinxin

    Published 2023-07-01
    “…In this study, a new type of power-function-sine flexure hinge is proposed. The calculation formula of compliance and rotation accuracy of the flexure hinge is derived by using Castigliano's second theorem. …”
    Get full text
    Article
  2. 842

    Adjustable lifetime-prolonging structure for topology control in heterogeneous wireless sensor network by Xiao-hong LI, Jing-qiao GE, Da-fang ZHANG

    Published 2013-08-01
    “…The problem of topology control in a network of heterogeneous wireless devices with different maximum transmission ranges was considered.For most topology control structures,the energy model adopted is quite unrealistic,in which the reception energy is commonly neglected.Moreover,most existing approaches to topology control were mainly considered to preserve energy-efficient paths in the resulting topology structures which may not allow network to realize maximum potential lifetime.An adjustable lifetime-prolonging structure for heterogeneous wireless sensor network (ALPH) to control topology was presented.Different from the prior work,based on the more realistic energy model,preserving all the maximal lifetime paths in the resulting topology structures was considered.Properties of ALPH by proof or simulation shows:the topologies derived under ALPH preserve the network connectivity and bi-directionality; it preserves all maximal lifetime paths between any pair of nodes under different RF modules; it enables each node to adjust the topology independently between DRNG and the MaxPower graph via parameter <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <msub> <mi>P</mi> <mrow> <msub> <mi>R</mi> <mn>0</mn> </msub> </mrow> </msub> </math></inline-formula> and allows nodes to have different path loss exponents; compared with previous work of DRNG,DGG,EYG and the MaxPower graph based on the real device’s parameters,it can effectively prolong network lifetime.…”
    Get full text
    Article
  3. 843

    Analysis on Loose Circle of Surrounding Rock of Large Deformation Soft-Rock Tunnel by Rui Wang, Yiyuan Liu, Xianghui Deng, Yu Zhang, Xiaodong Huang, Xiao Ding

    Published 2020-01-01
    “…Furthermore, the theoretical calculations and field tests of the loose circle in the typical sections of grade II and III deformation of Yuntunbao tunnel are carried out, and the thickness and distribution law of loose circle of surrounding rock of large deformation soft-rock tunnel is revealed. The results show that the formula based on the unified strength criterion is applicable for a large deformation tunnel in soft rock.…”
    Get full text
    Article
  4. 844

    Privacy Auditing in Differential Private Machine Learning: The Current Trends by Ivars Namatevs, Kaspars Sudars, Arturs Nikulins, Kaspars Ozols

    Published 2025-01-01
    “…Therefore, there is a need for effective methods that can audit <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mo>(</mo><mi>ϵ</mi><mo>,</mo><mi>δ</mi><mo>)</mo></mrow></semantics></math></inline-formula> differentially private algorithms before they are deployed in the real world. …”
    Get full text
    Article
  5. 845

    A Design of Fault-Tolerant Battery Monitoring IC for Electric Vehicles Complying With ISO 26262 by Byambajav Ragchaa, Liji Wu, Xiangmin Zhang

    Published 2024-01-01
    “…The design of battery cell voltage detection is realized by a second order, incremental <inline-formula> <tex-math notation="LaTeX">$\Sigma \Delta $ </tex-math></inline-formula> ADC with a high-voltage channel multiplexing scheme. …”
    Get full text
    Article
  6. 846

    Experimental Quantification of Local Pressure Loss at a 90° Bend in Low-Pressure Dilute-Phase Pneumatic Conveying of Coarse Particles by Rui Zhu, Chunsheng Luo, Xin Li, Fei Yan

    Published 2019-01-01
    “…Based on the additional pressure theory of Barth, an empirical formula estimating the local pressure loss is obtained using dimensional and nonlinear regression analysis. …”
    Get full text
    Article
  7. 847

    An Accelerated Successive Convex Approximation Scheme With Exact Step Sizes for L1-Regression by Lukas Schynol, Moritz Hemsing, Marius Pesavento

    Published 2025-01-01
    “…We consider the minimization of <inline-formula><tex-math notation="LaTeX">$\ell _{1}$</tex-math></inline-formula>-regularized least-squares problems. …”
    Get full text
    Article
  8. 848

    Nonlinear Seepage Model of Gas Transport in Multiscale Shale Gas Reservoirs and Productivity Analysis of Fractured Well by Ting Huang, Xiao Guo, Kun Wang

    Published 2015-01-01
    “…The simulation results have been compared with field data and influencing parameters are analyzed thoroughly. …”
    Get full text
    Article
  9. 849

    Sensitivity Analysis of MTPA Control to Angle Errors for Synchronous Reluctance Machines by Martin Petrun, Jernej Černelič

    Published 2024-12-01
    “…Although magnetic saturation increased this sensitivity slightly, reducing the allowable error range by up to 25%, the maximum angle deviation for up to 1% of the performance decrease still corresponded to approximately <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mo>±</mo><msup><mn>3</mn><mo>∘</mo></msup></mrow></semantics></math></inline-formula> around the MTPA trajectory. …”
    Get full text
    Article
  10. 850

    ZeST: A Zero-Resourced Speech-to-Speech Translation Approach for Unknown, Unpaired, and Untranscribed Languages by Luan Thanh Nguyen, Sakriani Sakti

    Published 2025-01-01
    “…ZeST consists of two main phases: <xref ref-type="disp-formula" rid="deqn1">(1)</xref> Discovering semantically related speech pairs from unpaired data by leveraging self-supervised visually grounded speech (VGS) models and <xref ref-type="disp-formula" rid="deqn2">(2)</xref> Achieving textless speech-to-speech translation for untranscribed languages using discrete speech representations and sequence-to-sequence modeling. …”
    Get full text
    Article
  11. 851

    A Systematic Analysis and Experimental Verification of Joint Pricing and Inventory Strategies in Competitive Newsvendor Environments by Mengmeng Shi, Yue Liu, Shaohui Wu

    Published 2024-12-01
    “…., different equilibrium prices corresponded to different optimal inventory quantities. The experimental results show that about <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mn>50</mn><mo>%</mo></mrow></semantics></math></inline-formula> of the joint pricing and inventory decisions were consistent with the predictions of the equilibrium model. …”
    Get full text
    Article
  12. 852

    Tooth Profile Synthesis and Meshing Force Characteristic of Sinusoidal Double Generating-wave Pushrod Movable Tooth Transmission by Wang Lichuang, An Zijun

    Published 2020-02-01
    “…The results show that the transmission ratio is the main factor affecting the actual profile interference of the center gear, and the amplitude is the second. …”
    Get full text
    Article
  13. 853

    Research on physical activity levels of men at the age of fifty and over and comparison of some demographic data by Sefik Ozbek, Muslum Colak, Yunus Oztasyonar, Sebnem Sarvan Cengız, Mehmet Gullu

    Published 2016-08-01
    “…Their BMIs have been calculated by using length2 / weight formula. Their hip and waist rates have been calculated from the formula developed by Garner et al. and Singh. …”
    Get full text
    Article
  14. 854

    Reduced phase-state detection based on virtual modulation indexes for Multi-h CPM by Shunqin XIE, Ke ZHOU, Dahai CHEN, Xianglu LI, Sheng ZHONG, Jian ZHANG

    Published 2019-09-01
    “….Simplified detection with reduced phase-state based on virtual modulation indexes was designed for Multi-h CPM.Multiple sets of modulation indexes different from the transmitter were constructed in the receiver,and the per-survivor processing was used to solve the mismatch caused by the inconsistency of the modulation indexes between the receiver and the transmitter.When the denominator of virtual modulation index was much smaller than the original denominator of actual transmitted signal,the phase states of coherent sequence detection could be effectively simplified,thus the complexity of coherent detection for Multi-h CPM could be reduced.The trellis could be simplified further via combining with the frequency pulse truncation(FPT) used for simplifying correlation states.The simulation results show that for advanced range telemetry (ARTM) CPM signal,various simplified receiving schemes based on virtual modulation indexes can be designed.When the virtual modulation indexes are set to <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mrow><mo>[</mo> <mrow> <mfrac> <mtext>3</mtext> <mtext>4</mtext> </mfrac> <mtext>,</mtext><mfrac> <mtext>2</mtext> <mtext>4</mtext> </mfrac> </mrow> <mo>]</mo></mrow></math></inline-formula>,the number of trellis states can be reduced from 512 (in optimal detection) to 64,but the performance loss is less than 0.05 dB.Further combined with FPT algorithm,the number of trellis states can be reduced to 16,while the performance loss is only 0.75 dB.…”
    Get full text
    Article
  15. 855

    I. Dünya Savaşı’ndan Önce Türk Boğazlarına Yönelik Rus Talepleri ve İngiltere’nin Tutumu (1908-1914) by Abdurrahman BOZKURT

    Published 2021-06-01
    “…During the Bosnian Crisis, when the Russians raised their demands for the Straits ‘ status quo to be revised, the British developed a formula to withdraw their allies’ demands. This formula, announced on 14 October 1908, was based on the acceptance of Russian demands on the condition that all states could enjoy the same rights. …”
    Get full text
    Article
  16. 856

    Research on affine equivalence enumeration of the three families vectorial function by Feng YUAN, Ji-jun JIANG, Yang YANG, Sheng-wei XU

    Published 2017-11-01
    “…In recent years,Qu-Tan-Tan-Li function,Zha-Hu-Sun function and Tang-Carlet-Tang function have been proposed with differential uniformity 4 and many good cryptographic properties.the counting problem of affine equivalent to the three families cryptographic functions was investigated.By using some properties of finite fields,the upper and lower bound of the number of affine equivalent to the Zha-Hu-Sun function,and the upper bound of the number of affine equivalent to the Qu-Tan-Tan-Li function and Tang-Carlet-Tang function were computed,respectively.Moreover,a conjecture was given about the exact number of affine equivalent to the Zha-Hu-Sun function.Results show that there are at least<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <msup> <mn>2</mn> <mrow> <mn>53</mn></mrow> </msup> <msup> <mrow><mo>[</mo> <mrow> <mstyle displaystyle="true"> <munderover> <mo>∏</mo> <mrow> <mi>i</mi><mo>=</mo><mn>1</mn></mrow> <mn>8</mn> </munderover> <mrow> <mo stretchy="false">(</mo><msup> <mn>2</mn> <mi>i</mi> </msup> <mo>−</mo><mn>1</mn><mo stretchy="false">)</mo></mrow> </mstyle></mrow> <mo>]</mo></mrow> <mn>2</mn> </msup> </math></inline-formula>cryptographic functions of affine equivalent to the Zha-Hu-Sun function over finite field GF(2<sup>8</sup>),which can be chosen as S-boxes of block ciphers.…”
    Get full text
    Article
  17. 857

    A Proof of Łojasiewicz’s Theorem by Namhoon Kim

    Published 2014-01-01
    “…We give a necessary and sufficient condition for a primitive of a distribution to have the value at a point in the sense of Łojasiewicz. A formula defining the indefinite integral of a distribution with a basepoint is introduced, and further structural results are discussed.…”
    Get full text
    Article
  18. 858

    A Reinforcement Learning Based Approach for Efficient Routing in Multi-FPGA Platforms by Umer Farooq, Habib Mehrez, Najam Ul Hasan

    Published 2024-12-01
    “…For this purpose, we first find a trade-off between the exploration and exploitation approach (also termed as the <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mi>ϵ</mi></semantics></math></inline-formula>-greedy approach) in our RL-based framework while not affecting the final Quality of Results (QoR). …”
    Get full text
    Article
  19. 859

    New design paradigm for federated edge learning towards 6G:task-oriented resource management strategies by Zhiqin WANG, Jiamo JIANG, Peixi LIU, Xiaowen CAO, Yang LI, Kaifeng HAN, Ying DU, Guangxu ZHU

    Published 2022-06-01
    “…The total training time is <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mrow> <mi>T</mi><mo>=</mo><msub> <mi>N</mi> <mi>ϵ</mi> </msub> <mo>⋅</mo><msub> <mi>T</mi> <mi>d</mi> </msub> </mrow></math></inline-formula>, and <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mrow> <msub> <mi>N</mi> <mi>ϵ</mi> </msub> </mrow></math></inline-formula> is a decreasing function of quantization level q,and T<sub>d</sub> is an increasing function of q . …”
    Get full text
    Article
  20. 860

    A Dual-Polarized Stacked Ceramic Antenna With High Isolation by Liyuan Cao, Wenjian Sun, Hang Wong

    Published 2025-01-01
    “…Its measured and simulated results are in good agreement. The 42% operating bandwidth covers from 3.3 GHz to 5.15 GHz for the reflection coefficient <inline-formula> <tex-math notation="LaTeX">$\le $ </tex-math></inline-formula> -10 dB and with high isolation across the entire operating bandwidth. …”
    Get full text
    Article